Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » Cardholder Data

Cardholder Data

Cardholder data (CD) consists of all personally identifiable information (PII), such as the cardholder’s name, card number, expiration date, and CVV security code of the individual with a credit or debit card. This is sensitive card information subject to security regulations like PCI DSS. Banks, payment merchants, and other entities that store and process this data must have adequate security measures to protect the cardholder’s data from security threats. Failure to protect cardholder data can land you in legal problems, and there are financial penalties as well.

Additional reading

A Complete Guide to ISO 27001 Surveillance Audit

If your organization has implemented ISO 27001, it must be audited by an accredited auditor to be certified. An ISO 27001 audit reviews your organization’s information security management system (ISMS) against a set of defined standards.  Once you are certified, it does not stop there. Maintaining it involves more work, both for you and the…

Multi Cloud Security Architecture: The Secret to Safekeeping Data

Businesses depend on multiple cloud based platforms to function seamlessly. While these significantly reduce IT complexity, maintaining a huge infrastructure of multiple endpoints opens a pandora’s box of complications – non-compliance, and security threats, vulnerabilities. As more companies adopt BYOD policy, the number of cloud components deployed outside the organization’s firewall are now higher than…

Mandatory ISO 27001 Documents You Must Prepare

Identifying documents for ISO 27001 demands meticulous attention to detail. Overlooking critical documents or including unnecessary ones are common scenarios with far-reaching consequences. Adding a layer of complexity to the process are the various formats—digital files, physical records, screenshots, emails, time stamps, evidence catalogue, etc. The stakes are high, as gaps in documentation could lead…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.